This presentation was given at the EPUB summit on April 7th, 2016, by Bill Rosenblatt, from GiantSteps, US. It presents the status of the Licensed Content Protection DRM, to be implemented as a plug-in of the Readium SDK.
This companion report to We Are Social's comprehensive new Digital in 2016 report presents headline internet, social and mobile data for 232 countries around the world. Each country snapshot is presented as its own infographic, ready to be copy-pasted direct into your own presentations or web content. For a more insightful analysis of the numbers in this report, please visit http://bit.ly/DSM2016ES.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Each month, join us as we highlight and discuss hot topics ranging from the future of higher education to wearable technology, best productivity hacks and secrets to hiring top talent. Upload your SlideShares, and share your expertise with the world!
Not sure what to share on SlideShare?
SlideShares that inform, inspire and educate attract the most views. Beyond that, ideas for what you can upload are limitless. We’ve selected a few popular examples to get your creative juices flowing.
Licensing in Composite Open Source ProjectsProtecode
Navigating licenses of composite open source software packages can be a difficult undertaking. Composite projects often contain more than one open source package and each project could have its own individual license, creating potential licensing dilemmas for those who wish to incorporate the code into their own project.
Rightsizing Open Source Software IdentificationnexB Inc.
Webinar recording available at the end of the slide deck.
Heather Meeker, partner at O'Melveny & Myers LLP and Philippe Ombredanne, founder at nexB Inc. discussed the latest open source software identification tools available for use in your compliance process.
Agenda
- Key Elements of a Policy for use of OSS
- Overview of OSS Identification
- Survey of open source and commercial tools for OSS Identification
- Rightsizing your OSS Identification Process and Tools.
If you are interested in open source scanning and open source compliance products, please visit http://www.nexb.com/, see also https://www.youtube.com/user/DejaCode/ for other webinar recordings.
Some open source projects make it very simple to understand what license applies to the published works. Unfortunately, not all projects are created equal.
Managing the Software Supply Chain: Policies that Promote Innovation While Op...FINOS
Jeff Luszcz, Flexera Software: Managing the Software Supply Chain: Policies that Promote Innovation While Optimizing Security and Compliance.
Do you build software, sell software consulting services, or contribute to the open source community? Understanding your software supply chain and learning the best way to manage them is worth your time. As the consumption of open source and other third party software increases, companies who know how to manage and influence the supply chain have a competitive advantage over those who don’t do it as well. Developers, Architects, and IP attorneys need to understand the long term impact of leveraging Open Source and Third Party software in their enterprise software, internal tools and web services. Join Jeff Luszcz, VP of Product Management at Flexera, as he walks through best practices to manage OSS in the financial services world.
Ubucon 2013, licensing and packaging OSSNuno Brito
As developers of open source and free software, we share our code freely with the world. It feels great. The problem is when someone points out that the code can't be used for some odd reason. Either because of missing license information or because the reported licenses are incompatible.
If you're writing code then you shouldn't miss this talk. We'll be showing which licenses you should avoid mixing (for e.g Apache v2 inside GPL v2) and other tips to avoid a licensing headache. In the end we'll talk about the SPDX format introduced by the Linux Foundation and show practical examples.
This companion report to We Are Social's comprehensive new Digital in 2016 report presents headline internet, social and mobile data for 232 countries around the world. Each country snapshot is presented as its own infographic, ready to be copy-pasted direct into your own presentations or web content. For a more insightful analysis of the numbers in this report, please visit http://bit.ly/DSM2016ES.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Each month, join us as we highlight and discuss hot topics ranging from the future of higher education to wearable technology, best productivity hacks and secrets to hiring top talent. Upload your SlideShares, and share your expertise with the world!
Not sure what to share on SlideShare?
SlideShares that inform, inspire and educate attract the most views. Beyond that, ideas for what you can upload are limitless. We’ve selected a few popular examples to get your creative juices flowing.
Licensing in Composite Open Source ProjectsProtecode
Navigating licenses of composite open source software packages can be a difficult undertaking. Composite projects often contain more than one open source package and each project could have its own individual license, creating potential licensing dilemmas for those who wish to incorporate the code into their own project.
Rightsizing Open Source Software IdentificationnexB Inc.
Webinar recording available at the end of the slide deck.
Heather Meeker, partner at O'Melveny & Myers LLP and Philippe Ombredanne, founder at nexB Inc. discussed the latest open source software identification tools available for use in your compliance process.
Agenda
- Key Elements of a Policy for use of OSS
- Overview of OSS Identification
- Survey of open source and commercial tools for OSS Identification
- Rightsizing your OSS Identification Process and Tools.
If you are interested in open source scanning and open source compliance products, please visit http://www.nexb.com/, see also https://www.youtube.com/user/DejaCode/ for other webinar recordings.
Some open source projects make it very simple to understand what license applies to the published works. Unfortunately, not all projects are created equal.
Managing the Software Supply Chain: Policies that Promote Innovation While Op...FINOS
Jeff Luszcz, Flexera Software: Managing the Software Supply Chain: Policies that Promote Innovation While Optimizing Security and Compliance.
Do you build software, sell software consulting services, or contribute to the open source community? Understanding your software supply chain and learning the best way to manage them is worth your time. As the consumption of open source and other third party software increases, companies who know how to manage and influence the supply chain have a competitive advantage over those who don’t do it as well. Developers, Architects, and IP attorneys need to understand the long term impact of leveraging Open Source and Third Party software in their enterprise software, internal tools and web services. Join Jeff Luszcz, VP of Product Management at Flexera, as he walks through best practices to manage OSS in the financial services world.
Ubucon 2013, licensing and packaging OSSNuno Brito
As developers of open source and free software, we share our code freely with the world. It feels great. The problem is when someone points out that the code can't be used for some odd reason. Either because of missing license information or because the reported licenses are incompatible.
If you're writing code then you shouldn't miss this talk. We'll be showing which licenses you should avoid mixing (for e.g Apache v2 inside GPL v2) and other tips to avoid a licensing headache. In the end we'll talk about the SPDX format introduced by the Linux Foundation and show practical examples.
Software audit strategies: how often is enough? Protecode
With the widespread use of open source software in proprietary software projects, organizations are looking for ways to mitigate licensing, security and quality vulnerabilities related to open source code. These organizations are increasing deploying software audits which involve scanning a software portfolio to uncover all software packages as well as their associated licensing and copyright obligations, security vulnerabilities and other code attribute information.
Open Source & What It Means For Self-Sovereign Identity (SSI)Evernym
Open source and open standards have been two pillars of self-sovereign identity since the beginning. Only by breaking down barriers to both development and production can we ensure that SSI works for everyone, everywhere.
Openness is also at the core of how Evernym operates, and our motivation for launching Sovrin, subsequently donating Hyperledger Indy to the world, and more recently, open-sourcing our own products.
In this webinar, we covered:
- The importance of open source software, and why it's needed for self-sovereign identity
- The open source tools available today, from Hyperledger Indy and Aries to Evernym's Verity
- What Evernym's open-sourcing of Verity means for developers
- Getting started with either open source or our free Sandbox plan
Managing Open Source Software Supply ChainsnexB Inc.
Heather Meeker and Michael Herzog discuss the latest trends in open source compliance for supply chain activities: the key legal issues for supply chain management as well as the latest automation tools and projects for open source management.
Agenda
• Legal issues for supply chain management
• Best practices to avoid claims and reduce risk
• Latest automation tools and projects for open source compliance management
SFO15-TR1: The Philosophy of Open Source DevelopmentLinaro
SFO15-TR1: The Philosophy of Open Source Development
Speaker: Jorge Ramirez-Ortiz
Date: September 22, 2015
★ Session Description ★
FLOSS - Free / Libre Open Source Software [1] What _is_ “the community”? What do they want from you? What do you get in return? [1] http://en.wikipedia.org/wiki/Free\_and\_open-source\_software
★ Resources ★
Video:
Presentation:
Etherpad: pad.linaro.org/p/sfo15-tr1
Pathable: https://sfo15.pathable.com/meetings/302926
★ Event Details ★
Linaro Connect San Francisco 2015 - #SFO15
September 21-25, 2015
Hyatt Regency Hotel
http://www.linaro.org
http://connect.linaro.org
Similar to B.Rosenblatt presentation of LCP, epub summit (20)
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Why Readium LCP?
DRM used to protect content and implement access
models
– Retail
– Membership organizations
– E-textbooks
– Library lending
– Subscriptions
Need for DRM standard to help ensure interoperability
3. Current E-Book DRM Market
Leading Retailers’ Own DRMs
Amazon
Apple
Kobo
Nook (Barnes & Noble)
Independent DRMs
Adobe Content Server
VitalBooks DRM
(e-textbooks)
Marlin
(Intertrust, Sony)
Fasoo
MarkAny
4. Genesis of Readium LCP
Begun in 2012 within IDPF
– Subsequently integrated with Readium project
EPUB2 standard did not include DRM
– This has led to lack of interoperability and fragmentation
Limitations with third-party DRMs
– Costs, particularly for small retailers, libraries, non-profits
– Vendor instability or lack of commitment
– Complexity of implementation
5. Readium LCP Objectives
Low-cost, simple DRM for use with Readium
Seamless, friction-free reading experience
– E.g. offline reading, no “phone home”
Enable interoperability among EPUB3 reading systems
– While enabling other DRMs to integrate with Readium
– Minimize “walled gardens”
Support primary content access models:
– Permanent distribution (retail, giveaway)
– Time-based distribution (lending, subscription)
– Accessibility for print-disabled
Security comparable to commercial DRMs
Eliminate commercial vendor dependency
6. Components of Readium LCP
Specification
Encryption Profile
Open source client and server code
Key material
License agreements
Robustness rules
7. Open Source DRM?
Code can be open source
– Anyone can use or modify code
– But not anyone can join interoperable ecosystem
Other things required to join ecosystem
– Secret keys
– Digital certificates
– Compliance testing
– Robustness certification
8. Elements of LCP Security
Encryption algorithm
– AES-256, U.S. government standard
– Used in most commercial DRMs
Passphrase
– Assigned by distributor or chosen
by user
Encryption profile
– Specifies how encryption scheme
works
– Contains secret key for protecting
passphrase, to inhibit export of
content beyond LCP ecosystem
– Confidential to licensees
License Status Documents
– Files that store keys and rights
descriptions
Digital certificates
– Secure identifiers of distributors,
issued by trusted Certificate
Authority
– Establish and vouch for
distributors’ identity
9. Open Source and Security
To hack a DRM:
– Find unencrypted content
– Find encryption keys
Robustness (“hardening”) techniques:
– Obfuscate code at compile time to make reverse engineering hard
– Include “guards” to detect suspicious activity
– Require keys to be kept in secure memory
– Generally, make it so knowing source code doesn’t help much
– Analogous to using published crypto algorithm
Robustness rules:
– Requirements that implementations do the above
– Conditions of licensing
10. LCP and Interoperability
Passphrase required to open EPUB file
Any compliant reading system with LCP will open file
with passphrase
The reading system will observe rights on the file
(e.g. time limits, text-to-speech conversion)
11. Readium LCP Logo Program
Membership in Readium LCP interoperable ecosystem
Requires signing license agreement
Must pass compliance test suite (supplied by EDRLab)
– Tests conformance with Compliance Rules
– Ensures interoperability, among many other things
Access to encryption profile
Agree to comply with robustness rules
– Self-certification
– Publisher(s) may require third party audit
Fees charged
– To recover administrative costs
– TBD but will be lower than commercial DRMs
12. Implementation Partners
EDRLab
– Licensing
– Compliance test suite administration
– Key material supplier
Cartesian
– Robustness rule consultants
– Available for robustness audits as necessary
International Telecomm’s Union (ITU)
– Certificate authority
– Keepers of X.509 certificate standard